Hi
I'm using the same versions / debian packages (libscep 0.09-1 and
3.14.4-0)
with an IOS XE 17.3.3 device.
Do you have a Root -> Issuing -> Device CA structure or just a single
root
scenario?
--
regards
Daniel
Am 2021-10-05 04:58, schrieb Carlos Velasco:
Hello,
I made a test with 1 Cisco device using CRL through SCEP and it worked
for me:
Cisco log:
# crypto pki certificate validate test
Oct 5 04:52:58.041 CEST: CRYPTO_PKI_SCEP: Client received CertRep -
GRANTED (34)
Oct 5 04:52:58.041 CEST: CRYPTO_PKI: status = 100: certificate is
granted
Oct 5 04:52:58.041 CEST: CRYPTO_PKI:Verified signed data for
trustpoint test (1181 bytes):
SCEP log:
Oct 5 04:52:57 daemon:info scep: scep[874225]: 2021/10/05 04:52:57
INF Incoming request from 169.254.207.2 with GetCACert [pid=874225]
Oct 5 04:52:57 daemon:info scep: scep[874225]: 2021/10/05 04:52:57
INF Incoming request from 169.254.207.2 with PKIOperation [pid=874225]
Catchall log:
Oct 5 04:52:57 daemon:info catchall: catchall[1025300]: 2021/10/05
04:52:57 openxpki.application.INFO LibSCEP PKIOperation; message type:
GetCRL [pid=1025300|sid=tkqT]
Daniel, which versions are you using?
My Cisco device is IOS-XE 17.3.4a
Openxpki is 3.14.4
libscep is 0.0.9
Regards,
Carlos Velasco
_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users
_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users